Summer Sale- Special Discount Limited Time 65% Offer - Ends in 0d 00h 00m 00s - Coupon code: netdisc

CompTIA 220-1002 CompTIA A+ Certification Exam: Core 2 Exam Practice Test

Note! Following 220-1002 Exam is Retired now. Please select the alternative replacement for your Exam Certification. The new exam code is 220-1102
Page: 1 / 67
Total 665 questions

CompTIA A+ Certification Exam: Core 2 Questions and Answers

Question 1

A desktop technician is responsible for the OS migration of 300 end users. As part of the migration, the technician must save the end users* data to a temporary shared drive. The data must include any hidden files to ensure 100% of the data is retained. Which of the following commands will achieve this result by default?

Options:

A.

robocopy

B.

copy

C.

xcopy

D.

cp

Question 2

The medical records department of a local hospital recently upgraded its computers. A technician needs to ensure the data stored on the hard drives is unrecoverable. Which of the following methods should the technician use to meet the requirement?

Options:

A.

Standard format

B.

Low-level format

C.

Overwrite

D.

Degauss

Question 3

Which of the following uses a remote access server to forward a user's logon password to an authentication server, allowing or denying access to a system?

Options:

A.

WPA2-PSK

B.

AES

C.

TACACS

D.

TKIP

Question 4

A systems administrator creates a new folder in the user profile. The administrator wants it to have different NTFS permissions than its parent folder. Which of the following settings should the administrator change?

Options:

A.

File attributes

B.

Share permissions

C.

Local share

D.

Inheritance

Question 5

A technician needs to connect to a network switch in a remote location. The technician wants to make sure the data passed over the wire is encrypted so it cannot be read by someone using a sniffer. Which of the following connection protocols should the technician use?

Options:

A.

Telnet

B.

SSH

C.

SMB

D.

HTTP

E.

SFTP

Question 6

A user is working on a shared computer and attempts to open the email application, which freezes when opened. A technician logs into the computer, and the email application works without issue. The technician has the user log back in, but the application still freezes when opened. Which of the following is the NEXT step the technician should take to resolve the issue?

Options:

A.

Check for and apply software updates

B.

Perform repair installation on the application

C.

Add the user to the local administrators group

D.

Rebuild the user’s mail profile

Question 7

A technician is attempting to recover data from a damaged laptop that was running Windows 10. The technician removes the drive and places it in a known-good computer. The computer boots and sees the drive, but no data is displayed. Which of the following is the reason the technician is experiencing this issue?

Options:

A.

exFAT security

B.

Ext3 security

C.

HFS security

D.

EFS security

E.

CDFS security

Question 8

A technician must manually modify the HOSTS system file in order to resolve a website address to a specified

local destination. Which of the following utilities should the technician use to BEST accomplish the task?

Options:

A.

Regedit

B.

services.msc

C.

Msinfo32

D.

Notepad

E.

MMC

Question 9

A technician is in the process of removing a recently discovered Trojan horse application from a users laptop. Which of the following should the technician complete to prevent reinfection of the same machine?

Options:

A.

Reenable Windows System Restore after rebooting the device

B.

Research the symptoms to identify the threat.

C.

Update the operating system and anti-malware signatures.

D.

Isolate the infected machine from all networks.

Question 10

A technician needs to manage a Linux workstation remotely. This workstation contains highly sensitive data, and therefore, it must be accessed in the most secure method possible Which of the following technologies should the technician use to manage this system?

Options:

A.

Telnet

B.

HTTPS

C.

SSH

D.

RDP

E.

SFTP

Question 11

An application is installed and configured locally on a workstation, but it writes all the save files to a different workstation on the network. Which of the following accurately describes the configuration of the application?

Options:

A.

Network-based

B.

Client/server

C.

Application streaming

D.

Peer-to-peer

Question 12

A Chief Executive Officer (CEO) is giving a presentation at an industry conference but forgot to bring a laptop. The company has emailed several large presentation files and the links to several videos that will be streamed during the presentation. While showing the last video, it starts to buffer, times out. and will not display The CEO restarts the phone that is being used for the presentation and verifies there is enough free storage space, but the video still will not play Which of the following is MOST likely causing the Issue?

Options:

A.

Data transmission over limit

B.

Unauthorized account access

C.

Resource over use

D.

Unintended Bluetooth pairing

Question 13

A user is surprised that a newly installed third-party smartphone application requires permissions to access the camera, location, and microphone. Unaware of a reason why permissions are needed for the application to function as advertised, the user contacts the help desk for assistance. Which of the following should the help desk team recommend the user do in this situation?

Options:

A.

After granting these permissions, disable the camera and GPS

B.

Install the application and change the permissions later

C.

Cancel installation of the application and report it to the application source

D.

Accept these permission requests and install the application

Question 14

Several users at an office have noticed their computers have been behaving erratically over the past hour. A technician suspects there may be a network worm or a hardware failure because all the affected computers were purchased together. Which of the following should the technician perform FIRST?

Options:

A.

Download antivirus updates

B.

Update the device drivers

C.

Quarantine the affected systems

D.

Perform hardware diagnostics

Question 15

A Windows 7 machine appears to have a failure. Every time it is rebooted, the message “BOOTMGR is missing” appears.

You have previously inserted a Windows 7 installation DVD into the DVD-ROM.D18912E1457D5D1DDCBD40AB3BF70D5D

Please repair this failure without overwriting the customers’ local user profiles.

INSTRUCTIONS

Use the Windows recovery and repair utilities to remediate the issue.

If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.

Question # 15

Question # 15

Options:

Question 16

A technician is having issues with the WiFi connection while working on a Mac. The technician wants to check which SSID the computer is connected to and some statistics about the connection. Which of the following terminal commands should the technician use?

Options:

A.

apt-get

B.

iwconfig

C.

sudo

D.

ifconfig

Question 17

A security administrator does some network testing and identifies significant issues with security on desktop computers. As part of remediation, the network administrator is developing documentation based on best practices for applying updates to end users’ computers. The network administrator must create the process documentation needed to submit back to the security administrator for approval. Which of the following process documents would the network administrator MOST likely create? (Choose two.)

Options:

A.

Risk analysis

B.

End-user acceptance

C.

Backout plan

D.

Plan for change

E.

Business processes

F.

Request for proposal

Question 18

A user updated an iOS smartphone and is now having issues connecting to the Internet. The phone shows 1x for signal strength while making calls. Which of the following are the MOST likely causes of these issues?

(Choose two.)

Options:

A.

Slow performance

B.

Slow data speeds

C.

No wireless connectivity

D.

Baseband

E.

Application hang

F.

Overheating

Question 19

Ann, a network engineer, wants to use FTP to back up and push configurations to several switches she is updating. Ann starts the FTP service on her PC and places the new configuration in the correct directory. However, she cannot communicate with the PC using FTP from the switch. Which of the following must Ann do to allow FTP communications?

Options:

A.

Create a static DNS entry on the server for the PC

B.

Change her NIC IP address to dynamic

C.

Create a new exception on her local firewall

D.

Make sure the PC’s IP is in the management VLAN

Question 20

A SOHO user calls a technician and wants to secure a home network. The SOHO user needs to have protection from physical connections and ensure that employees cannot access applications or personal emails. Which of the following would the technician MOST likely configure on the new network device to accommodate this SOHO user’s request? (Select TWO).

Options:

A.

MAC filtering

B.

Default SSID

C.

Radio power levels

D.

Content filtering

E.

Physical security

Question 21

A user is staying at a hotel that only offers Fast Ethernet connectivity to the network. The user’s laptop is

currently using the corporate network for access to network resources as well as the cloud. Which of the

following should the help desk recommend performing prior to using the hotel network?

Options:

A.

Add a country code exception to the firewall

B.

Unmap all network drives

C.

Change the proxy settings

D.

Enable Remote Assistance

Question 22

A workstation needs to be hardened against brute force attacks. It also needs to be protected if a user walks away and leaves the computer unlocked. Which of the following would harden the workstation as required? (Select TWO).

Options:

A.

Set up a failed attempts lockout setting.

B.

Enable a screen saver password.

C.

Use a stronger Active Directory password.

D.

Disable local logon time restrictions.

E.

Create a BIOS password

F.

Enforce a password reset policy.

Question 23

A technician receives a call from an end user in the human resources department who needs to load an older stand-alone application on a computer to retrieve employee information. The technician explains the application can be run in compatibility mode, but it will need to be removed as soon as the user obtains the required information. Which of the following BEST describes the technician’s concern with loading this application on the user’s computer?

Options:

A.

Incompatibility

B.

Impact to the network

C.

Impact to the user

D.

Impact to the device

Question 24

Ann, an end user, is utilizing a stylus on her tablet. The recognition point is off when she uses the stylus, but it registers in the correct spot when she uses her finger.

Which of the following would be the BEST resolution to Ann’s issue?

Options:

A.

Restart the tablet.

B.

Disable and then reenable Bluetooth.

C.

Calibrate the touchscreen sensor.

D.

Disconnect and then reconnect the stylus.

Question 25

A technician wants to deploy a solution to manage a computer remotely. The technician is not allowed to modify any network configuration and is not able to forward any ports on the router to internal devices. Which of the following remote access technologies would be BEST suited for this situation?

Options:

A.

Remote desktop protocol

B.

Telnet client

C.

Virtual network computer

D.

Third-party tools

E.

Secure shell

Question 26

A customer recently lost data because it was accidentally deleted The customer calls a technician and asks to have a Windows backup solution installed The customer needs to ensure all company data is backed up and quickly recoverable every time a change Is made. Which of the following solutions would the technician MOST likely recommend? (Select TWO)

Options:

A.

File level

B.

Bare metal

C.

Snapshot

D.

Shadow Copy

E.

Critical applications

F.

Image level

Question 27

A technician is securing a server room by implementing a two-factor authentication solution Which of the following should the technician implement to provide the BEST security for the server room?

Options:

A.

Door lock and mantrap

B.

Server lock and badge reader

C.

Security guard and entry control roster

D.

Biometric lock and hardware token

Question 28

A home user reports slow computer performance and application crashes after clicking a "repair" button on a pop-up warning while browsing the Internet Which of the following are the FIRST steps a technician should take to identify and resolve the issue? (Select TWO).

Options:

A.

Perform a system file check and replace any changed files with their original versions

B.

Enable the pop-up blocker on the Internet browser

C.

Uninstall any recently installed unknown programs and browser extensions,

D.

Perform a hard shutdown and cold boot the computer

E.

Scan the RAM and hard drive using an up-to-date antivirus program.

Question 29

During a network server outage, the administrators computer received an IP address of 169.254.0.10 and had no access to internal or external resources. Which of the following should be configured to ensure the administrator's computer retains network access?

Options:

A.

Alternative IP address

B.

Wake-on-LAN

C.

APIPA

D.

Proxy setting

Question 30

The IT department has installed new software in the folder C:\Program Files\Business Application\. Ann, a user, runs the business application and tries to save her work. When doing so, Ann receives the following error:

Cannot save file C: \Program Files\Business Application\file1.wrk – Access is denied.

Which of the following would be the MOST secure solution to this error?

Options:

A.

Add Ann to the local Power Users group

B.

Set the software to save to the %APPDATA% folder

C.

Add Ann to the local administrator group

D.

Give Ann write access to C:\Program Files\

E.

Give Ann permission to elevate her permissions through a UAC prompt

Question 31

Which of the following steps should a technician perform when the Included Windows driver for a video card does not have the needed features?

Options:

A.

Install the third-party driver from the manufacturer's website.

B.

Update the included Windows driver from Windows Update

C.

Flash the firmware on the BIOS to the latest version.

D.

Replace the video card with one that is supported by Windows natively.

Question 32

A technician is alerted to a virus on a PC. The technician isolates the PC from the network. After verifying there are no other infected PCs on the network, which of the following is the SAFEST method for the technician to use to clean the infected PC?

Options:

A.

Download and apply the security patch that addresses the vulnerability that was exploited

B.

Use System Restore to bring the PC back to a previous restore point.

C.

Reimage the computer and update it with all the latest patches

D.

Download another antivirus software that will quarantine the virus.

Question 33

Joe, a user, believes his computer is infected with malware. The device is having difficulty accessing some

websites, and web services are not responding from any of the web browsers, although Joe can access these

services from his smartphone without issue. The computer’s malware scanner has the latest definitions

installed. Which of the following would BEST explain why the computer is functioning this way?

Options:

A.

Expired root certificate

B.

OS update failures

C.

Pop-up blocker

D.

Hijacked email

Question 34

Which of the following is the MOST common method of allowing outside access through a wireless SOHO router for specific program access?

Options:

A.

Enabling port forwarding

B.

Creating a content filter whitelist

C.

Increasing radio power levels

D.

Properly placing access points

Question 35

Which of the following is a Device that stores a copy of a certificate that is used for authentication?

Options:

A.

Biometric scanner

B.

Soft token

C.

Smart card

D.

OTP token

Question 36

A technician is setting up network adapter settings on Windows clients that have static IP address assignments. The technician has more than 100 workstation to complete and wants to automate the process. The requirements for the adapter settings are as follows:

* They must utilize a command line utility

* The technician has no access to Group Policy

* All workstation should have an IP address assigned by the DHCP.

Which of the following steps should the technician perform to meet these requirements?

Options:

A.

Use the ipconfig/release and ipconfig /renev command to have the workstation contact the DHCP for a new lease. Place these two commands in a ,bat file to execute on all systems.

B.

Use the petsh command to reset the workstation adapter. Then use the ipconfig /renew command to use DHCP for a new lease. Place these two commands in a ,bat file to execute on all systems.

C.

Use the net use command to view active connection on the network. Then use the ipconf /renew command to use DHCP for a new lease. Place these two commands in a ,bat file to execute on all systems.

D.

Use the netstat command to find connections on the workstation adapter. Then use the ipconf /renew command to use DHCP for a new lease. Place these two commands in a .bat file to execute on all systems.

Question 37

Ann, a user, has asked technician for help with her computer. Ann has been trying to speed it up with simple Upgrades but has not been successful. She added memory and removed unnecessary applications that were no longer in use. After removing the applications, however, the computer seemed to get slower. Which of the following is the BEST solution?

Options:

A.

Defragment the hard drive.

B.

Kill the removed tasks.

C.

Perform software updates.

D.

Rebuild the user profile.

Question 38

A technician is selling up a new virtualization server which will be initially used to host a client VM that will manage print jobs. The client, however, has future plans lo utilize the server to host other VMs. Which of the following should the technician implement to ensure maximum uptime of the client VM?

Options:

A.

Cloud storage backup

B.

Large file storage

C.

Image-level backup

D.

Uninterruptible power supply

Question 39

A company recently experienced a security incident in which an unauthorized user was able to insert a USB flash drive into a kiosk, launch a non-native OS. and deliver malicious payloads across the network. Which of the following security measures would have been BEST to prevent the attack from being executed in the first place' (Select TWO)

Options:

A.

Using a host-based antivirus with real-time scanning

B.

Implementing automatic screen locks after 60 seconds of inactivity

C.

Creating a strong BIOS'UEFI password

D.

Disabling AutoRun for USB devices

E.

Enabling the Secure Boot option

F.

Changing the default administrator credentials

Question 40

A technician is removing a virus from a user’s Windows workstation. The virus was installed by the user while downloading pirated software from the Internet. Which of the following should the technician do to address this issue?

Options:

A.

End the current explorer.exe task. Update and run an antivirus scanning utility to remove the threat. Relaunch explorer.exe using Task Manager.

B.

End the current explorer.exe task using the command line. Update and run an antivirus scanning utility to remove the threat.

C.

Launch explorer.exe using Task Manager. Update and run an antivirus scanning utility to remove the threat.

D.

Update and run an antivirus scanning utility to remove the threat. Launch explorer.exe using Task Manager.

Question 41

Which of the following would MOST likely be connected to a computer Id provide electricity in case of a blackout?

Options:

A.

Battery backup

B.

Surge suppressor

C.

Portable generator

D.

Power inverter

Question 42

A technician encounters a previously unidentified issue. The technician conducts some research, finds a solution, and resolves the issue. According to best practices, which of the following should the technician do so the issue can be addressed if it is encountered again?

Options:

A.

Inform the immediate supervisor about the findings.

B.

Email all the other technicians to explain the problem and resolution.

C.

Enter the resolution in the ticket and close it.

D.

Add the findings to the knowledge base

Question 43

A user’s antivirus recently expired, so the user downloaded and installed a free system protection application. The application found numerous rootkits, Trojans, viruses, and missing critical patches. It was unable to fix all the issues, however, and suggested the user call technical support. Which of the following is the FIRST step to begin repairing the computer?

Options:

A.

Remove the rogue antivirus.

B.

Install Windows Updates.

C.

Reimage the computer.

D.

Call the technical support number.

Question 44

A help desk technician needs to make administrative changes securely on a remote user's machine. The user must be logged off when the changes are made. Which of the following tools would the technician MOST likely use?

Options:

A.

RDP

B.

Virtual network computing

C.

Microsoft Remote Assistance

D.

SFTP

Question 45

Joe, a mobile device user, reached his monthly quota of data about halfway through the current billing cycle. Joe contacts a technician to identify potential issues with the mobile device, as his usage patterns have not changed over the past month. Which of the following is MOST likely causing this issue?

Options:

A.

There are unintended WiFi connections

B.

Location tracking has been enabled

C.

Applications are causing high resource utilization.

D.

Malware is causing excessive data transmission

Question 46

Joe, a user, did not receive emails over the weekend like he usually does. Productivity software is functioning properly. Joe never powers off his computer and typically leaves all applications open. No other users are reporting

email issues. Which of the following is MOST likely the cause of the issue?

Options:

A.

There is an OS update failure.

B.

Out-of-office is turned on.

C.

There is an Internet connectivity issue.

D.

SMTP services are not running.

Question 47

A user cannot print to a network printer. A technician runs the Windows 10 troubleshooting utility, but it does not find any errors. Which of the following printer settings should the technician check NEXT?

Options:

A.

Duplex

B.

Spooler

C.

Collate

D.

Resolution

Question 48

Some of a company’s computers were manually configured to bypass the DNS servers for connections to a connections to a fileshare server. A technician needs to ensure at the computers use DNS to reach resources on the network. Which of the following should the technician do to confirm all the computers use only DNS?

Options:

A.

Delete al alias record entries in DNS.

B.

Ensure al computers are using the same subnet.

C.

Reset the Windows Firewall settings to default.

D.

Remove all entities in the hosts file

Question 49

A technician notices a workstation is connecting to an IP address on the network and wants to determine the machine name that belongs to that IP address. Which of the following commands should the technician use?

Options:

A.

gpresult

B.

ipconfig

C.

nslookup

D.

net user

Question 50

A user's laptop screen goes black after five minutes of not being used. Which of the following Windows Control Panel utilities should be used to modify the user experience?

Options:

A.

Troubleshooting

B.

Internet Options

C.

Power Options

D.

Device Manager

Question 51

A systems administrator created a policy that should create a shortcut on a user's desktop Shortly after the policy was created, a technician inspects the user's desktop and notices the shortcut is not present. The administrator verifies that the policy was created correctly and that it is being applied to the user's account. Which of the following will MOST Likely resolve the issue Immediately without interrupting the user's session?

Options:

A.

gpupdate /force

B.

gpupdate /boot

C.

gpupdate /logoff

D gpupdate /target:computer

Question 52

Which of the following would be used to protect technicians from dust particles when they are entering a datacenter located near a construction site?

Options:

A.

A surge suppressor

B.

Compressed air

C.

Vacuums

D.

ESD gloves

E.

Air filters

Question 53

A technician needs to open a laptop chassis to perform an upgrade. Which of the following procedures must be technician follow FIRST? (Select Two.)

Options:

A.

Attach an ESD strap

B.

Use proper lifting techniques.

C.

Put on safely goggles.

D.

Disconnect the power from the PC.

E.

Remove all jewelry

F.

Wear an air filter mask

Question 54

Which of the following is an example of PHI?

Options:

A.

Phone number

B.

Credit card number

C.

Salary information

D.

Employer information

Question 55

An issue with a user's computer was addressed several times by multiple technicians, but the User has continued to experience the issue. The User calls the help desk and insists on speaking to a supervisor; however, the

supervisor is away at lunch. Which of the following should the technician perform FIRST?

Options:

A.

Offer to address the concern since the supervisor is currently unavailable.

B.

Show the work orders to the customer as proof the issue was resolved.

C.

Tell the customer to return at a later time when the supervisor is available.

D.

Call the supervisor on the phone and let the customer talk to the supervisor directly.

Question 56

An administrator is loading a new Linux server. Which of the following filesystems will the administrator MOST likely select for the primary partition?

Options:

A.

ExFAT

B.

NTFS

C.

ext3

D.

Swap

Question 57

A user's desktop icons appear much larger than before, and the display colors look unusual A technician runs hardware diagnostics but finds no issues. The system logs show the update service ran last night; however, no new applications were installed. Which of the following is me BEST solution?

Options:

A.

Restore the system image

B.

Reinstall the application

C.

Restart the services.

D.

Roll back the device driver

Question 58

An employee is taking a credit card payment over the phone, but the payment system has a temporary outage. To avoid inconveniencing the customer, the employee writes down the credit card number and expiration date on a notepad to be entered later This is in violation of:

Options:

A.

PHI

B.

PCI

C.

Pll

D.

PGP

Question 59

A user tries to open a client/server application, but a prompt appears for the username and password The user is able to open and use the email client with no issues. The user's workstation is a loaner laptop Everyone at the company is given administrator rights on their individual workstations. Which of the following is MOST likely preventing the user from running this program?

Options:

A.

EFS

B.

NTFS

C.

UTP

D.

UAC

Question 60

A technician needs to format a 64GB flash drive. Which of the following formats will the technician MOST likely use?

Options:

A.

FAT

B.

ExFAT

C.

FAR32

D.

CDFS

Question 61

A technician needs to make changes to a production system. Before doing so, which of the following should be completed in case the changes have unintended consequences beyond their original scope?

Options:

A.

Draft a complete scope of the changes.

B.

Formulate a back-out plan for the changes.

C.

Ensure all relevant end users are notified of the changes.

D.

Create a risk analysis involving the changes.

Question 62

A technician recently built a gaming PC with a multicode CPU, 32GB DDR4 memory, a 1TB SSD. and a high-end GPU The technician installed the OS and a new game but noticed the frame-rate performance was much lower than expected Which of the following should the technician do NEXT to address the performance issues?

Options:

A.

Install a higher wattage PSU.

B.

Download security patches

C.

Defragment the drive

D.

Update the device drivers

Question 63

A smartphone user has been receiving unsolicited emails that contain Pl in the webmail inbox associated with the device. Which of the following steps should the user take FIRST to identify the cause of the issue?

Options:

A.

Report the emails as spam.

B.

Check the permissions on all installed third-party applications.

C.

Delete the webmail account and create a new one.

D.

Restore the smartphone to factory default settings.

Question 64

Which of the following identifies changes in the environment, such as alternating current failure?

Options:

A.

UPS monitor

B.

MSDS

C.

ESD mat

D.

Surge suppressor

Question 65

An end user contacts the help desk to report a browser issue. When the user selects a hyperlink to a POF file within the browser, nothing happens. The user notes the browser is otherwise working properly. Which of the following should a technician direct the user to do FIRST?

Options:

A.

Ask the user to restart the computer.

B.

Install browser updates.

C.

Open the link in a different web browser.

D.

Disable the pop-up blocker.

Question 66

Which of the following is a risk to computer equipment when the humidity is low?

Options:

A.

Static discharge

B.

Corrosion

C.

Frequent brownouts

D.

Increased dust

Question 67

A security team is auditing a company’s network logs and notices that a USB drive was previously inserted into several of the servers. Many login attempts were then successfully performed using common login information.

Which of the following actions should be taken to close the vulnerability? (Select two.)

Options:

A.

Disable guest account

B.

Remove admin permissions

C.

Modify AutoRun settings

D.

Change default credentials

E.

Run OS security updates

F.

Install a software firewall

Question 68

A technician needs to deploy a remote access technology to be able to access desktop computers. When a technician logs in to a user's computer, the user and the technician must be able to see the desktop simultaneously and use the mouse and keyboard. Which of the following would be BEST suited for this task?

Options:

A.

VNC

B.

Telnet

C.

SSH

D.

RDP

Question 69

Joe. a technician, receives notification that a share for production data files on the network Is encrypted. Joe suspects a crypto virus Is active. He checks the rights of the network share to see which departments have access. He then searches the user directories of those departmental users who are looking for encrypted files. He narrows his search to a single user's computer. Once the suspected source of the virus is discovered and removed from the network, which of the following should Joe do NEXT?

Options:

A.

Educate the end user on safe browsing and email habits.

B.

Scan and remove the malware from the infected system.

C.

Create a system restore point and reboot the system.

D.

Schedule antivirus scans and perform Windows updates.

Question 70

A user's personal settings are not saving, and a technician suspects the user's local Windows profile is corrupt. The technician wants to check the size of the ntuser.dat file, but It does not appear in the user's profile directory. Which of the following Control Panel utilities should the technician use to correct this?

Options:

A.

Folder Options

B.

Sync Center

C.

Display Settings

D.

User Accounts

Question 71

A user’s smartphone is making the camera shutter noise even when the user is not taking pictures. When the user opens the photo album, there are no new pictures. Which of the following steps should be taken FIRST to determine the cause of the issue?

Options:

A.

Uninstall the camera application

B.

Check the application permissions

C.

Reset the phone to factory settings

D.

Update all of the applications on the phone

E.

Run any pending OS updates

Question 72

Corporate management is concerned about the security of the company’s mobile phones, in the event they are lost or stolen. Management instructs the IT staff to ensure the data on the devices is not accessible by unauthorized users. Which of the following would provide the BEST level of protection in this scenario? (Choose two.)

Options:

A.

Use full device encryption

B.

Enable a pattern lock

C.

Implement remote wipe features

D.

Use device lockout policies

E.

Require complex administrator passwords

F.

Disable unknown application installations

Question 73

A user is attempting to install an application and receives an error stating there is not enough space to install the application. Which of the following did the user overlook?

Options:

A.

Installation method

B.

System requirements

C.

OS compatibility

D.

File permissions

Question 74

Which of the following BEST describes the purpose of an ESD mat?

Options:

A.

Protects against accidental static discharge

B.

Protects against dust/dirt contamination

C.

Protects against accidental scratches

D.

Protects against accidental water damage

Question 75

A small office calls a technician to investigate some “invalid certificate” errors from a concerned user. The technician observes that whenever the user to access a secure website from the Windows desktop, this error is encountered. No other users in the office are experiencing this error. Which of the following should the technician do NEXT? (Choose two.)

Options:

A.

Remove any proxy servers configured on the user’s browsers.

B.

Assist the user with purchasing an SSL certificate and save the certificate to the desktop.

C.

Disable the SPI firewall on the office’s gateway and any other routers.

D.

Instruct the user to ignore the certificate error since the user is connecting to a secure website.

E.

Create an outbound rule in Windows Firewall named after the user’s homepage.

F.

Run anti-malware scans and download the latest Windows updates.

Question 76

Which of the following user types should be used in a Windows environment to grant Internet access without allowing the permanent storage of files on the system?

Options:

A.

Local Administrator

B.

Standard User

C.

Power User

D.

Guest User

Question 77

A technician repaired a laptop for a customer. The customer then complained the repair took too long and questioned the steps the technician took to fix the problem. Which of the following should the technician do NEXT?

Options:

A.

Provide documentation of the repair to the customer

B.

Allow the customer to voice concerns and post the story to social media later

C.

Inform the customer the job is done and return to the office

D.

Defend each step and why it was necessary

Question 78

Which of the following is a reason to use WEP over WPA?

Options:

A.

Device compatibility

B.

Increased security

C.

TACACS

D.

Multifactor authentication

Question 79

Which of the following Windows OS technologies is used to store remote data accessed via a WAN connection on local servers for user access?

Options:

A.

BranchCache

B.

Swap partition

C.

Domain access

D.

Proxy server

Question 80

A network administrator recently learned users have been accessing websites that are restricted based on content by the firewall. To prevent users from circumventing the firewall rules, which of the following Windows settings should the administrator locks to prevent them from being changed?

Options:

A.

Default gateway

B.

Proxy server

C.

WINS server

D.

DHCP settings

Question 81

A systems administrator needs to add security to the server room.

Which of the following would provide the BEST security for the room? (Choose two.)

Options:

A.

Universal serial bus locks

B.

Personal identity verification cards

C.

Privacy screen

D.

Entry control roster

E.

Door locks

F.

Privacy window

Question 82

Joe, a user, returns his computer to the technician who performed a virus removal on it the week before. Joe states that several symptoms have returned.

Which of the following should the technician have covered previously as part of the original repair?

Options:

A.

End-user education

B.

Pre-installation environment cleaning

C.

Disabling of System Restore

D.

Infected system quarantine

Question 83

A technician is contacted by a user who is working from home but is unable to connect to any office resources (e.g., files, printers). The user is able to access the Internet.

Which of the following should the technician check FIRST?

Options:

A.

VPN

B.

DHCP

C.

NAT

D.

DNS

Question 84

A SOHO technician recently moved some data from one server to another to increase storage capacity. Several users are now reporting they cannot access certain shares on the network. When the users attempt to access the shares, they get the following error: Access Denied. The technician confirms the users are all in the proper security groups and have the proper access, but they are still unable to access the shares. Which of the following are the MOST likely reasons for these issues? (Select two.)

Options:

A.

Administrative share permissions

B.

Mapped drives

C.

Group Policy hours restriction

D.

Denied write/delete permissions

E.

Disabled proxy settings

Question 85

Which of the following devices provides protection against brownouts?

Options:

A.

battery backup

B.

surge suppressor

C.

rack grounding

D.

line conditioner

Question 86

Which of the following steps should a technician take FIRST to prevent an electrical hazard when repairing a PC?

Options:

A.

Put on an ESD strap.

B.

Place components on an ESD mat

C.

Disconnect the power before servicing the PC

D.

Place the PC on a grounded work bench

Question 87

A technician is installing the latest OS on a user’s system. The user wants all of the settings and file to remain intact during the installation.

Which of the following upgrade methods should the technician use?

Options:

A.

network installation

B.

clean install

C.

in-place upgrade

D.

image deployment

Question 88

An employee reported that a suspicious individual was looking through the recycle bin. Which of the following types of social engineering threats is this?

Options:

A.

Phishing

B.

Spear phishing

C.

Dumpster diving

D.

Impersonation

Question 89

While attempting to install a new program, an end user is notified the workstation meets the memory requirements, but it does not meet the requirements for free space. Due to time constraints the user needs a quick way to install and access the program. Which of the following is the BEST option given the solution?

Options:

A.

Install to a network drive

B.

Install to a USB drive

C.

Install to a DVD-RW

D.

Install to a security internal_HDD

Question 90

Which of the following can be applied directly to an organizational unit In Active Directory to provide security to both the user and the machine?

Options:

A.

Folder Redirection

B.

Group Policy

C.

Security Groups

D.

Home Folder

Question 91

Joe, a technician, has his daily plans forwarded to him by his supervisor. Upon arrival to the external to the second support call of the day, Joe realizes the issue will require much more time than initially scheduled, and several support calls will not be completed. Which of the following would be the appropriate action for Joe?

Options:

A.

Contact his supervisor so the supervisor can make schedule changes.

B.

Move the appoints to the next business day.

C.

Reach out to a colleague to assist in completing the jobs.

D.

Continue to work on the current call, and get to the others as soon as possible.

Question 92

Which of the following should be enacted to reduce a company's liability and exposure to a potential lawsuit?

Options:

A.

Acceptable use policy

B.

Incident documentation policy

C.

Password compliance policy

D.

Change control policy

Question 93

Which of the following would a technician use to store memory chips from a laptop safely after an upgrade?

Options:

A.

Mylar bags

B.

Cardboard boxes

C.

Antistatic containers

D.

Paper envelopes

Question 94

Which of the following would MOST likely contain troubleshooting guides?

Options:

A.

Acceptable use policy

B.

Topology diagram

C.

Knowledge base

D.

Incident documentation

Question 95

An end user’s PC is taking a long time to boot. Which of the following operations would be the BEST to resolve this issue with minimal expense? (Select two.)

Options:

A.

Remove applications from startup

B.

Defragment the hard drive

C.

Install additional RAM

D.

Install a faster hard drive

E.

End the processes in Task Manager

F.

Run the Disk Cleanup utility

Question 96

A technician has identified malware on a user’s system. Which of the following should the technician do NEXT according to malware removal best practices?

Options:

A.

Enable System Restore and create a restore point so no data is lost

B.

Educate the user about how to avoid malware in the future

C.

Update the antivirus software and run a full system scan

D.

Move the infected system to a lab with no network connectivity

Question 97

A user Is unable to access a network share out can access email. A technician has confirmed the user has the appropriate permissions to access the share. Which of the following commands should the technician use FIRST?

Options:

A.

ping

B.

nslooking

C.

net use

D.

ipconfig

Question 98

Joe, a customer, calls a technician to report a remote computer is demonstrate erratic behavior while he is working on it. The technician verifies the files and directories Joe is working on locally cannot be open in any application, and the computer is extremely slow. Which of the following is the MOST likely cause of this issue?

Options:

A.

Files disappearing

B.

File permission changes

C.

Application crash

D.

Too many start items

Question 99

Which of the following is the maximum RAM limit of a Windows 32-bit version?

Options:

A.

no limit

B.

4GB

C.

8GB

D.

32GB

Page: 1 / 67
Total 665 questions